$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for controlling copy protection in digital video networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/173
출원번호 US-0142039 (1998-08-31)
국제출원번호 PCT/US97/05257 (1997-03-31)
§371/§102 date 19980831 (19980831)
국제공개번호 WO97/37492 (1997-10-09)
발명자 / 주소
  • Peter J. Wonfor
  • Derek T. Nelson
출원인 / 주소
  • Macrovision Corp.
대리인 / 주소
    George Almeida
인용정보 피인용 횟수 : 199  인용 특허 : 13

초록

A method and system of providing copy protection of video analog and digital signals and the like, wherein the signals are transmitted via a digital delivery network, and may comprise, for example, pay per view (PPV) program materials protected by copyrights of respective program rights holders. The

대표청구항

1. A method of providing copy protection of signal material transmitted via digital delivery networks to a consumer's set-top box, to prevent copying and/or subsequent viewing of a recorded copy of the signal material, comprising:supplying copy protection controls indicative of desired copy protecti

이 특허에 인용된 특허 (13)

  1. Ryan John O. (22015 Creekside Ct. Cupertino CA 95014), Apparatus and method for comprehensive copy protection for video platforms and unprotected source material.
  2. Kanota Keiji (Kanagawa JPX) Inoue Hajime (Chiba JPX) Kubota Yukio (Kanagawa JPX), Apparatus and method for preventing unauthorized copying of video signals.
  3. Kanota Keiji,JPX ; Inoue Hajime,JPX ; Kubota Yukio,JPX, Apparatus and method for preventing unauthorized copying of video signals.
  4. Garneau Pierre (Montreal CAX) Corriveau Josee (St-Leonard CAX) Dufresne Michel (Bouchorville CAX), Cable TV system using passwords.
  5. Ryan John O. (Cupertino CA), Copy protection for hybrid digital video tape recording and unprotected source material.
  6. Ottesen Hal Hjalmar (Rochester MN) Smith Gordon J. (Rochester MN) VanLeeuwen George Willard (Rochester MN), Intelligent multimedia set-top control method and apparatus in which billing signals are communicated to an information.
  7. Yoshizawa Kazuhiko,JPX ; Owashi Hitoaki,JPX ; Hayakawa Hiroyuki,JPX ; Otsubo Tadasu,JPX ; Hosokawa Kyoichi,JPX, Interactive chargeable communication system with billing system therefor.
  8. Ryan John O. (Santa Clara CA), Method and apparatus for processing a video signal so as to prohibit the making of acceptable video tape recordings ther.
  9. Quan Ronald, Method and apparatus for removing or defeating effects of copy protection signals from a video signal.
  10. Seth-Smith Nigel (all of ; Toronto CAX) Bates Cameron (all of ; Toronto CAX) Lim Samson (all of ; Toronto CAX) Rassel William van (all of ; Toronto CAX) Yoneda Robert (all of ; Toronto CAX) Lucas Kei, Method for controlling copying of protected information transmitted over a communications link.
  11. Leonard Eugene (Sands Point NY) Perlman Bill (New York NY) Budai Karoly (Danbury CT) Dolson William R. (New York NY), Modifying a television signal to inhibit recording/reproduction.
  12. Bestler Caitlin B. (Lisle IL) Hartley ; III Harry A. (Palatine IL) Rabii Khosro Marcus (Hawthorn Woods IL), System for updating an authorization memory.
  13. Buynak William J. ; Sterling Michael A., Videotape anti-copying encryption scheme.

이 특허를 인용한 특허 (199)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Horlander, Karl Francis, Adaptive video image information processing system.
  3. Horlander,Karl Francis, Adaptive video image information processing system.
  4. Horlander,Karl Francis, Adaptive video image information processing system.
  5. Lee,Jae heung; Park,Noh byung, Analog/digital signal processor and analog/digital signal processing method.
  6. Seok, Jong Won; Lee, Hye Joo; Choi, Bum Suk; Hong, Jin Woo, Apparatus for controlling storage and playback of digital broadcasting contents.
  7. Kuan,Cheng Peng; Lin,Yu Jen; Chung,Wen Hao; Wu,Yun Ei, Architecture and method of multilayered DRM protection for multimedia service.
  8. Giobbi, John J., Biometric personal data key (PDK) authentication.
  9. Giobbi, John J., Biometric personal data key (PDK) authentication.
  10. Giobbi, John J., Biometric personal data key (PDK) authentication.
  11. Robinson, Richard L.; Serkowski, Robert J.; Walker, William T., Certificate distribution via license files.
  12. Noh, Mi jung, Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data.
  13. Sibley,Erin H.; Sales,Michael W., Communication system for rebroadcasting electronic content within local area network.
  14. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Configuration of interfaces for a location detection system and application.
  15. Quan, Ronald; Cloutman, John F., Content control via guide data and/or metadata.
  16. Quan, Ronald, Content management for a video signal.
  17. Moskowitz, Scott A., Data protection method and device.
  18. Moskowitz, Scott A., Data protection method and device.
  19. Moskowitz, Scott A., Data protection method and device.
  20. Moskowitz, Scott A., Data protection method and device.
  21. Li, Zhi; Ghosal, Dipak; Ou, Canhui; Savoor, Raghvendra, Detecting distribution of multimedia content.
  22. Li, Zhi; Ghosal, Dipak; Ou, Canhui; Savoor, Raghvendra, Detecting distribution of multimedia content.
  23. Manowitz, Neal; Edwards, Eric D., Devices and methods for processing digital image data compatible with a television receiver.
  24. Manowitz,Neal; Edwards,Eric D., Devices and methods for processing digital image data compatible with a television receiver.
  25. Giobbi, John J., Digital content security system.
  26. Giobbi,John J., Digital content security system.
  27. Headings, Kevin P.; Schein, Steven M., Digital entertainment service platform.
  28. Headings, Kevin P.; Schein, Steven M., Digital entertainment service platform.
  29. Giobbi,John J., Digital rights management.
  30. Ficco, Michael H., Distributed media-aggregation systems and methods to operate the same.
  31. Ficco, Michael H., Distributed media-protection systems and methods to operate the same.
  32. Kahn, Raynold M.; Cocchi, Ronald P.; Gagnon, Gregory J., Distribution of broadcast content for remote decryption and viewing.
  33. Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using a trusted network key for sharing content.
  34. Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using client to host pairing of integrated receivers/decoders.
  35. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  36. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  37. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  38. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  39. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  40. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  41. Wakahara, Tatsuya, Information processing device and method, and recording medium.
  42. Guenebaud,Philippe, Interface module and decoder for host.
  43. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  44. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  45. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  46. Chaudhry, Kapil, Method and apparatus for communicating between a user device and a gateway device to form a system to allow a partner service to be provided to the user device.
  47. Chen, Xuemin; Chen, Iue-Shuenn; Tan, Shee-Yen; Zhu, Hongbo; Ye, Qiang, Method and apparatus for constructing an access control matrix for a set-top box security processor.
  48. Kahn, Raynold; Levy, Jordan, Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder.
  49. Hollar, Mark A., Method and apparatus for conveying rights across an analog video interface.
  50. Hollar,Mark A., Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels.
  51. Seidman,Lawrence P.; Goliff,William; Sibley,Erin H., Method and apparatus for distributing and selling electronic content.
  52. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; Cocchi, Ronald P.; James, Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
  53. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; Cocchi,Ronald P.; James,Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
  54. Quan, Ronald, Method and apparatus for modifying a subsequently generated control command in a content control system.
  55. Quan, Ronald, Method and apparatus for modifying a subsequently generated control command in a content control system.
  56. Shah-Nazaroff, Anthony A.; Goldschmidt Iki, Jean M.; Moore, Kenneth Alan; Williams, Christopher D., Method and apparatus for ordering entertainment programs from different programming transmission sources.
  57. Shah-Nazaroff, Anthony A.; Goldschmidt Iki, Jean M.; Moore, Kenneth Alan; Williams, Christopher D., Method and apparatus for ordering entertainment programs from different programming transmission sources.
  58. Quan, Ronald; Cloutman, John F., Method and apparatus for providing a content control signal in a media player via color burst phase modifications.
  59. Cloutman, John; Quan, Ronald, Method and apparatus for providing a content control signal via color burst phase modifications.
  60. Quan, Ronald, Method and apparatus for providing content control via detection of modifications to a signal.
  61. Shah-Nazaroff, Anthony A.; Goldschmidt Iki, Jean M.; Moore, Kenneth Alan; Williams, Christopher D., Method and apparatus for purchasing upgraded media features for programming transmissions.
  62. Quan, Ronald, Method and apparatus for receiving metadata, EPG, or IPG signals in an integrated circuit for control purposes.
  63. Ryan, John O.; Quan, Ronald; Salter, James H., Method and apparatus for storing copy protection information separately from protected content.
  64. Ryan, John O.; Quan, Ronald; Salter, James H., Method and apparatus for storing copy protection information separately from protected content.
  65. Quan, Ronald, Method and apparatus for synthesizing a copy protection or content control signal with improved playability of a TV set.
  66. Quan, Ronald, Method and apparatus for synthesizing copy protection for reducing/defeating the effectiveness or capability of a circumvention device.
  67. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  68. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  69. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  70. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  71. Major, Robert Drew; Carter, Stephen R.; Orman, Hilarie, Method and mechanism for vending digital content.
  72. Major,Robert Drew; Carter,Stephen R.; Orman,Hilarie, Method and mechanism for vending digital content.
  73. Major,Robert Drew; Carter,Stephen R.; Orman,Hilarie, Method and mechanism for vending digital content.
  74. Chen, Iue-Shuenn, Method and system for accessing protected memory.
  75. Duffield, David Jay; Diascorn, Jean-Louis Yves; Eskicioglu, Ahmet Mursit, Method and system for adding a conditional access system.
  76. Dellow, Andrew; Chen, Iue-Shuenn; Rodgers, Stephane (Steve); Chen, Xuemin (Sherman), Method and system for allowing no code download in a code download scheme.
  77. Juneau, Rene, Method and system for auditing and correcting authorization inconsistencies for reception equipment in a content delivery network.
  78. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  79. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  80. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  81. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  82. Juneau, J. Rene, Method and system for identifying and correcting location discrepancies for reception equipment in a content delivery network.
  83. Chaudhry, Kapil; Chung, Jin H., Method and system for managing digital rights for content.
  84. Tan, Shee-Yen; Chen, Xuemin; Chen, Iue-Shuenn; Ye, Qiang, Method and system for multi-level security initialization and configuration.
  85. Chen, Xuemin, Method and system for secure system-on-a-chip architecture for multimedia data processing.
  86. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  87. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  88. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  89. Stransky, Philippe; Engeström, Sven, Method for granting customers access to a product.
  90. Hudson, Ron J.; Coles, Terrence T.; Berry, Craig D.; Easty, Allen D., Method for interactive video content programming.
  91. Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Fullerton, Larry, Method of inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content.
  92. Marino, Nino, Methods and apparatus for managing interfaces in a placeshifting device.
  93. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems.
  94. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems.
  95. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems.
  96. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  97. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  98. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  99. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  100. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  101. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  102. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  103. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  104. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  105. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  106. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  107. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  108. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  109. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  110. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  111. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  112. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  113. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  114. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  115. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  116. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  117. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  118. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  119. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  120. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  121. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  122. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  123. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  124. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  125. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  126. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  127. Noraev,Dmitry A, Piracy-resistant data leasing system and method.
  128. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  129. Diehl, Eric, Process for transmitting digital data representative of a content.
  130. Ellis, Michael D; Knudson, Edward B; Thomas, William L; Davis, Bruce L, Program guide system for recording television programs.
  131. Knudson, Edward B.; Ellis, Michael D.; Thomas, William L.; Davis, Bruce L., Program guide system for recording television programs.
  132. Knudson, Edward B.; Ellis, Michael D.; Thomas, William L.; Davis, Bruce L., Program guide system for recording television programs.
  133. Knudson,Edward B.; Ellis,Michael D.; Thomas,William L.; Davis,Bruce L., Program guide system for recording television programs.
  134. Jang, Jung-In, Providing broadcast channel information.
  135. Akamatsu, Chiyo; Shinagawa, Tetsuo; Kudo, Yoshimichi, Receiver set, information apparatus and receiving system.
  136. Akamatsu, Chiyo; Shinagawa, Tetsuo; Kudo, Yoshimichi, Receiver set, information apparatus and receiving system.
  137. Akamatsu, Chiyo; Shinagawa, Tetsuo; Kudo, Yoshimichi, Receiver set, information apparatus and receiving system.
  138. Akamatsu,Chiyo; Shinagawa,Tetsuo; Kudo,Yoshimichi, Receiver set, information apparatus and receiving system.
  139. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  140. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  141. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  142. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  143. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P.; Schlacht, David N.; Basse, Hanno; James, Thomas H., Secure content transfer systems and methods to operate the same.
  144. Kahn, Raynold M.; Siegel, Philip I., Secure delivery of program content via a removable storage medium.
  145. Rao, Santhpur N.; Trapa, Valerie, Secure download manager.
  146. Gilman, Robert R.; Robinson, Richard L.; Serkowski, Robert J., Secure installation activation.
  147. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  148. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  149. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  150. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  151. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  152. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  153. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Secure storage and replay of media programs using a hard-paired receiver and storage device.
  154. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Secure storage and replay of media programs using a hard-paired receiver and storage device.
  155. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  156. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  157. Eyer, Mark Kenneth; Krishnan, Aditya; Zustak, Fred J.; Chang, Matthew S.; Proehl, Andrew M.; Candelore, Brant L.; Colsey, Nicholas; Yang, David K. L.; Golden, Dayan Ivy; Shintani, Peter Rae, Selective capture and storage of A/V objects in an interactive multimedia system.
  158. Nakano, Takehiko; Kitajima, Mariko, Signal supplying apparatus, signal processing method and record medium.
  159. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  160. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  161. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  162. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  163. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  164. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  165. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  166. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  167. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
  168. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  169. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  170. Ryan, John O.; Quan, Ronald, System and method for allowing copying or distribution of a copy protected signal.
  171. Hudson, Ron J.; Coles, Terrence T.; Berry, Craig D.; Easty, Allen D., System and method for interactive video content programming.
  172. Stevens, Clarke, System and method of managing digital rights.
  173. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  174. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  175. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  176. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  177. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  178. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  179. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  180. Klappert, Walter R.; McCarty, Michael, Systems and methods for initializing allocations of transport streams based on historical data.
  181. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  182. Le-Chau, Luan; Ly, Cuong T.; Kahn, Raynold M.; Sue, Ranny Q.; Chaudhry, Kapil; Pamplona, Joel M., Systems and methods for provisioning multi-dimensional rule based entitlement offers.
  183. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  184. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  185. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  186. Baer, David A.; Tingley, Jeff; Movshovich, Aleksandr; Grossman, Brad; Schoner, Brian F.; Tang, Chengfuh Jeffrey; Monahan, Chuck; Neuman, Darren D.; Wu, David Chao Hua; Cheung, Francis; Kranawetter, Greg A.; Nhu, Hoang; Tseng, Hsien-Chih Jim; Chen, Iue-Shuenn; Sweet, James D.; Bauch, Jeffrey S.; Klingler, Keith LaRell; Law, Patrick; Mamidwar, Rajesh; Simon, Dan; Tran, Sang Van; Johnson, Shawn V.; Jaffe, Steven T.; Nguyen, Thu T.; Nguyen, Ut; Tseng, Yao-Hua Steven; Delanghe, Brad; Giese, Ben; Demas, Jason; Ramakrishnan, Lakshman; Bhatia, Sandeep; Shih, Guang-Ting; Denk, Tracy C., Television functionality on a chip.
  187. Baer,David A.; Tingley,Jeff; Movshovich,Aleksandr; Grossman,Brad; Schoner,Brian F.; Tang,Chengfuh Jeffrey; Monahan,Chuck; Neuman,Darren D.; Wu,David Chao Hua; Cheung,Francis; Kranawetter,Greg A.; Nhu,Hoang; Tseng,Hsien Chih Jim; Chen,Iue Shuenn; Sweet,James D.; Bauch,Jeffrey S.; Klingler,Keith LaRell; Law,Patrick; Mamidwar,Rajesh; Simon,Dan; Tran,Sang Van; Johnson,Shawn V.; Jaffe,Steven T.; Nguyen,Thu T.; Nguyen,Ut; Tseng,Yao Hua Steven; Delanghe,Brad; Giese,Ben; Demas,Jason; Ramakrishnan,Lakshman; Bhatia,Sandeep; Shih,Guang Ting; Denk,Tracy C., Television functionality on a chip.
  188. Utsumi,Yoshimasa, Terminal apparatus.
  189. Wang, Jane, Terminal connection box and plug.
  190. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  191. Giobbi, John J., Two-level authentication for secure transactions.
  192. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  193. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  194. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  195. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  196. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  197. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  198. Watkins, Daniel, Video on demand DVD system.
  199. Dulac, Stephen P., Video on demand in a broadcast network.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로